Software  >  

Malicious Computer Code

RSS Feed    Add to Google    Add to My Yahoo!
Malicious Computer Code White Papers (View All Report Types)
Enterprise Security Gets Adaptive
sponsored by Kaspersky Lab
WHITE PAPER: This paper explores how to implement a more adaptive, integrated approach to app security suited for web, mobile, cloud, and virtual environments. Uncover the 4 pillars of adaptive enterprise security that will help your strategies for defending against advanced persistent threats (APTs) become more proactive and intelligence-driven.
Posted: 26 Oct 2016 | Published: 31 Dec 2015

Kaspersky Lab

Advanced Authentication Strategies for Detecting Real-time Threats
sponsored by HID
WHITE PAPER: How do you address the problem of maintaining security threats while balancing access requirements and costs? Learn about a multi-factor authentication service that not only enables secure transactions, devices, and accounts, but detects and defends against malware and breaches – protecting the integrity of the entire online transaction.
Posted: 04 Oct 2016 | Published: 25 Jun 2016


How to Protect Data from Ransomware
sponsored by Dell Software
WHITE PAPER: It can be difficult to recover data that is encrypted by ransomware malware. In this expert guide, discover how to stop ransomware from breaching your network in the first place and backup all of your data.
Posted: 27 Sep 2016 | Published: 22 Sep 2016

Dell Software

4 Features Your Security Strategy Needs in a Virtual Environment
sponsored by Kaspersky Lab
WHITE PAPER: This report discusses four features that a virtual desktop infrastructure (VDI) security solution must include. Discover ways to maintain the benefits of virtualization while also meeting the unique needs of VDI.
Posted: 24 Oct 2016 | Published: 24 Oct 2016

Kaspersky Lab

Integrated Security Technology & Management
sponsored by Armor
WHITE PAPER: Discover how to keep your sensitive data safe and your business up and running without interruptions. Ensure your organization, customers and sensitive data are protected by leveraging a defense-in-depth strategy that designed with integrated security from the ground up.
Posted: 24 Oct 2016 | Published: 30 Sep 2016


Stop Malware Before It Stops You
sponsored by Trustwave
WHITE PAPER: Discover how to detect and eliminate modern malicious activities and add significant value to your detection mechanism without impacting user experience. Learn how to stop new, dynamic malware that most mechanisms overlook, as well as close the 60% malware gap missed by other gateways.
Posted: 18 Oct 2016 | Published: 31 Dec 2013


Next-Generation Firewalls: An Investment Checklist
sponsored by Cisco Systems, Inc.
WHITE PAPER: What should you look for in a next-generation firewall? This paper includes a checklist against which you evaluate NGFWs. Read on now to determine the benefits a truly effective NGFW can deliver, and find one that will provide actionable indications of compromise to identify malicious activity, and more.
Posted: 12 Sep 2016 | Published: 12 Sep 2016

Cisco Systems, Inc.

QRAT Malware-As-A-Service
sponsored by Booz Allen Hamilton
WHITE PAPER: QRAT, a new remote access tool, first emerged in 2015 and is now targeting U.S. visa applicants via Skype's messenger service. Discover why QRAT is dangerous and how it can infect your system within this valuable white paper. Learn who's behind the QRAT tool, where it originated and why it may be targeting you right now.
Posted: 24 Oct 2016 | Published: 30 Jun 2016

Cybersecurity Perspectives from the Boardroom and C-suite
sponsored by IBM
WHITE PAPER: Discover how to best protect you organization against major cyberthreats, types of cyberthreats you may or may not know about and how to optimize your investment in your security solution. See security statistics from organizations across industries to better understand how you can implement your own enterprise risk plan as appropriate.
Posted: 30 Aug 2016 | Published: 01 Jul 2016


Operationalize Security to Patch Vulnerabilities
sponsored by BMC
WHITE PAPER: This report features analysis and commentary about the importance of security operations automation technology. Learn how you can solve your vulnerability issues simply through IT security and IT operations cooperation using best practices and technology available today.
Posted: 09 Sep 2016 | Published: 01 Aug 2016

Visit - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement